What happens to the file size

Assignment Help Basic Computer Science
Reference no: EM131049125

Suppose we have a compression function c, which takes a bit string s to a compressed string c(s). (a) Show that for any integer N there must be a string s of length N for which length(c(s)) ≥ N; that is, no effective compression is done.

(b) Compress some already compressed files (try compressing with the same utility several times in sequence). What happens to the file size?

(c) Given a compression function c as in (a), give a function c ′ such that for all bit strings s, length(c ′ (s)) ≤ min(length(c(s)), length(s)) + 1; that is, in the worst case, compression with c ′ expands the size by only 1 bit.

Reference no: EM131049125

Questions Cloud

Estimated the produce actual market value : FACTS Between 1987 and 1990, Inn Foods, Inc., imported frozen produce from six Mexican growers who agreed to issue invoices that understated the value of the produce. For each understated invoice, Inn Foods sent an order confirmation that estimate..
Events on the aggregate expenditure : Explain and illustrate using the Keynesian model (AE/Y diagram) the effect of the following events on the Aggregate Expenditure (AE) curve and income.
Large lump sum deposit today instead of annual deposits : You would like to have $56,000 in 12 years. To accumulate this amount you plan to deposit each year an equal sum in the bank, which will earn 6 percent interest compounded annually. Your first payment will be made at the end of the year. If you decid..
What is the bonds yield to call today if investors expect : A bond is sold for its face value of $1,000 with a 25-year maturity, a 9% coupon, and interest paid semiannually. The bond is callable 5 years from issuance at an 11% premium over face value. What is the bond's yield to call today if investors expect..
What happens to the file size : Compress some already compressed files (try compressing with the same utility several times in sequence). What happens to the file size?
Characteristic of monopolistic competition : What is the most important characteristic of monopolistic competition? How do firms behave differently from perfect competitors? What are the implications of having a large number of firms in a monopolistically competitive market?
What equal payments be : Mr. Bill S. Preston Esq. purchased a new house for $160,000. He paid $15,000 down and agreed to pay the rest over the next 10 years in 10 equal end of year payments plus 5 percent compound interest on the unpaid balance. What equal payments be?
Components of consumption spending : According to the Keynesian model, what are the two components of consumption spending? What factors determine how consumption changes when real disposable income changes? Explain.
Spot exchange rate-comparison to the dollar : Assume the spot exchange rate is 6.22 Chinese yuan per U.S. dollar. If the inflation rate in China is expected to be double that in the U.S. for the next two years, then what will happen to the yuan in comparison to the dollar?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is a packet? what is packet switching

What is a packet? What is packet switching?How would you explain the concept of packet switching?What are the advantages and disadvantages of packet switching over circuit switching?

  Build a graphical representation of a web-based input

build a graphical representation of a Web-based input for making a hotel reservation

  What risks are associated with data conversion

What risks are associated with data conversion? What controls should be considered in a data conversion process?

  Voluntarily gravitating to give up our real world experience

In an age of virtual worlds where people are spending inordinate amounts. Are we voluntarily gravitating to this world and giving up our real world experiences for virtual ones?

  Create logic circuit to decode dtmf-like keypad

Create the logic circuit which will decode a DTMF-like keypad. Keypad comprises of 16 keys, numbered 0 to 9, *, #, A, B, C, and D. Underneath keypad are four horizontal lines and four vertical lines.

  Discuss instantiating a thread in java

What methods are available for managing threads & how do we use them?

  Convert the binary number into a hexadecimal number

Pick the amount from one of the checks in your checkbook. ($50.24)1) Convert the decimal number into a binary number with three places to the right of the binary point.2) Convert the binary number into a hexadecimal number.

  Knowledge gap in senior management

The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP ..

  Write single statement print message first is followed first

Write a single statement that will print the message "first is " followed by the value of first, and then a space, followed by "second = ", followed by the value of second.

  Every program in a system contains

Assume that every program in a system contains 40,000 machine code instructions. To execute an instruction it takes 4 machine cycles. Assume that a computer constantly keeps 150 active processes in execution and each active process needs to be exe..

  Use a wrapper class to convert

The BufferReader class's readLine method returns a line from a file as a String. If you need to perform calculations, you will need to convert the String object into a number. You can use a wrapper class to convert.

  Identify organizations that may be susceptible

Acts considered cyberterrorism and / or information warfare can be divided into four separate categories; infrastructure attacks, information attacks, technological facilitation, and promotion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd